参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Which of the following security threats are MOST likely prevented through user training?()A Network IntrusionB Adware PopupsC Social EngineeringD Spam Messages”相关问题
  • 第1题:

    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

    A.Update antivirus definitions

    B.MAC filtering

    C.Effective security policies

    D.User awareness training


    参考答案:D

  • 第2题:

    In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?()

    • A、Incorrect subnet mask
    • B、Mismatched MTU
    • C、Switching loop
    • D、VLAN mismatch

    正确答案:C

  • 第3题:

    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

    • A、Update antivirus definitions
    • B、MAC filtering
    • C、Effective security policies
    • D、User awareness training

    正确答案:D

  • 第4题:

    A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()

    • A、The website has updated the security policies.
    • B、The user’s identity has been stolen.
    • C、The browser has been hijacked.
    • D、The user typed the website address incorrectly.

    正确答案:C

  • 第5题:

    A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()

    • A、MAC filtering
    • B、PoE
    • C、IP filtering
    • D、802.1X

    正确答案:D

  • 第6题:

    Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()

    • A、Spam blocker
    • B、Anti-Virus
    • C、Anti Spyware
    • D、Anti adware

    正确答案:B

  • 第7题:

    单选题
    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
    A

    Update antivirus definitions

    B

    MAC filtering

    C

    Effective security policies

    D

    User awareness training


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()
    A

    Switch

    B

    Repeater

    C

    Hub

    D

    WAP


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()
    A

    The website has updated the security policies.

    B

    The user’s identity has been stolen.

    C

    The browser has been hijacked.

    D

    The user typed the website address incorrectly.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?()
    A

    Incorrect subnet mask

    B

    Mismatched MTU

    C

    Switching loop

    D

    VLAN mismatch


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()
    A

    MAC filtering

    B

    PoE

    C

    IP filtering

    D

    802.1X


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
    A

    IDS

    B

    VPN

    C

    NIPS

    D

    HIDS


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()

    • A、Mesh
    • B、Bus
    • C、Ring
    • D、Star

    正确答案:C

  • 第14题:

    Mike, a technician, is troubleshooting a printer issue. The print spooler for a local printer continues to fill up with new jobs and no jobs are being processed at the printer. Which of the following is MOST likely the cause?()

    • A、The network connection is unavailable.
    • B、The printer is offline.
    • C、The user does not have the proper security permissions.
    • D、The print spooler is stopped.

    正确答案:B

  • 第15题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第16题:

    Bob, a user, reports that his computer is running slower since he viewed an online training presentation. Bob is also receiving an increased amount of spam email. Which of the following is the MOST likely cause of Bob’s issue?()

    • A、Virus
    • B、Worm
    • C、Network bandwidth
    • D、Malware

    正确答案:D

  • 第17题:

    Which of the following security threats are MOST likely prevented through user training?()

    • A、Network Intrusion
    • B、Adware Popups
    • C、Social Engineering
    • D、Spam Messages

    正确答案:C

  • 第18题:

    单选题
    Bob, a user, reports that his computer is running slower since he viewed an online training presentation. Bob is also receiving an increased amount of spam email. Which of the following is the MOST likely cause of Bob’s issue?()
    A

    Virus

    B

    Worm

    C

    Network bandwidth

    D

    Malware


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()
    A

    Spam blocker

    B

    Anti-Virus

    C

    Anti Spyware

    D

    Anti adware


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Bob, a user, reports that his computer is running slower since he viewed an online training presentation. Bob is also receiving an increased amount of spam email. Which of the following is the MOST likely cause of Bob’s issue?()
    A

    Virus

    B

    Worm

    C

    Network bandwidth

    D

    Malware


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following security threats are MOST likely prevented through user training?()
    A

    Network Intrusion

    B

    Adware Popups

    C

    Social Engineering

    D

    Spam Messages


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()
    A

    Incorrect DNS

    B

    Incorrect subnet mask

    C

    Duplicate IP address

    D

    Incorrect SSID


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Mike, a technician, is troubleshooting a printer issue. The print spooler for a local printer continues to fill up with new jobs and no jobs are being processed at the printer. Which of the following is MOST likely the cause?()
    A

    The network connection is unavailable.

    B

    The printer is offline.

    C

    The user does not have the proper security permissions.

    D

    The print spooler is stopped.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()
    A

    Mesh

    B

    Bus

    C

    Ring

    D

    Star


    正确答案: B
    解析: 暂无解析